Àü°ø¾È³»
Çѳ²´ëÇб³ ±³À°´ëÇпø¿¡ ¿À½Å°ÍÀ» ȯ¿µÇÕ´Ï´Ù.
°ú¸ñ¸í | ÇÐÁ¡ |
---|---|
ÄÄÇ»Åͱ³°ú±³À°·Ð(Theory of Computer Education) | 2ÇÐÁ¡ |
ÄÄÇ»Åͱ³°ú³í¸®¹× ³í¼ú(theories of teaching logic and logical writing based on computer) | 2ÇÐÁ¡ |
ÄÄÇ»Åͱ³°ú±³À翬±¸ ¹× Áöµµ¹ý(Method and Materials in Teaching of Computer) | 2ÇÐÁ¡ |
Àü»ê±³À°ÀúÀ۽ýºÅÛ(Computer Education authoring System) | 2ÇÐÁ¡ |
¾Ë°í¸®Áò ºÐ¼® ¹× ¼³°è(Advanced Algorithm Analysis and Design) | 2ÇÐÁ¡ |
¿ÀÅ丶Ÿ ÀÌ·Ð(Topics in Automata Theory) | 2ÇÐÁ¡ |
ÀΰøÁö´É Ư·Ð(Advanced Artificial Intelligence) | 2ÇÐÁ¡ |
½Ã½ºÅÛ ÇÁ·Î±×·¡¹Ö(System Programming) | 2ÇÐÁ¡ |
°í±Þ ÇÁ·Î±×·¡¹Ö ¾ð¾î(Theory of Advanced Programming Language) | 2ÇÐÁ¡ |
ºÐ»ê½Ã½ºÅÛ(Distributed Computing) | 2ÇÐÁ¡ |
ÄÄÆÄÀÏ·¯ Ư·Ð(Topics in compiler) | 2ÇÐÁ¡ |
ÄÄÇ»ÅÍ ³×Æ®¿öÅ© Ư·Ð(Advanced Computer Network) | 2ÇÐÁ¡ |
¿î¿µÃ¼Á¦ ±³À°Æ¯·Ð(Advanced Operaing System Education) | 2ÇÐÁ¡ |
¼ÒÇÁÆ®¿þ¾î°øÇÐÆ¯·Ð(Advanced Software Engineering) | 2ÇÐÁ¡ |
½Ã½ºÅۺм®±³À°·Ð(System Analysis) | 2ÇÐÁ¡ |
°æ¿µÁ¤º¸½Ã½ºÅÛ±³À°·Ð(Management Information System Education) | 2ÇÐÁ¡ |
µ¥ÀÌÅͺ£À̽º±³À°Æ¯·Ð(Advanced Database Management System Education) | 2ÇÐÁ¡ |
°è»ê±â±¸Á¶±³À°·Ð(Computer Architecture Education) | 2ÇÐÁ¡ |
¸¶ÀÌÅ©·ÎÇÁ·Î¼¼¼±³À°·Ð(Micro Processor Education) | 2ÇÐÁ¡ |
ÄÄÇ»Åͱ׷¡ÇȽº±³À°·Ð(Computer Graphics Education) | 2ÇÐÁ¡ |
Àü»êÅë°è(Computer stochastics) | 2ÇÐÁ¡ |
µ¥ÀÌÅͱ¸Á¶(Data structure) | 2ÇÐÁ¡ |
º¸¾È°øÇÐ(Security engineering) | 2ÇÐÁ¡ |
µ¥ÀÌÅÍÅë½ÅƯ·Ð(Advavced data communication) | 2ÇÐÁ¡ |
¹«¼±Åë½Å¸ÁƯ·Ð(Advavced wireless network) | 2ÇÐÁ¡ |
µ¥ÀÌÅͺ£À̽º(Database) | 2ÇÐÁ¡ |
½Ã½ºÅÛº¸¾È(System security) | 2ÇÐÁ¡ |
³×Æ®¿öÅ©ÇÁ·Î±×·¡¹Ö(Network programming) | 2ÇÐÁ¡ |
³×Æ®¿öÅ©º¸¾È(Network security) | 2ÇÐÁ¡ |
RFI / DUSN°ú º¸¾È(RFI / DUSN and security) | 2ÇÐÁ¡ |
µðÁöÅÐÆ÷·»Á÷(Digital forensics) | 2ÇÐÁ¡ |
À¥±â¹Ý±³À°½Ã½ºÅÛ(Web-based Education System) | 2ÇÐÁ¡ |
¸ÖƼ¹Ìµð¾îȰ¿ë ±³À°(Miltimedia baxed Education) | 2ÇÐÁ¡ |
±³À°ÇÁ·ÎÁ§Æ®°ü¸®·Ð(Educational Project Management) | 2ÇÐÁ¡ |
Á¤º¸º¸È£ °³·Ð(Introduction to Information Security) | 2ÇÐÁ¡ |
Çö´ë ¾ÏÈ£ÇÐ ±âÃÊ(Fundamentals of Modern Cryptology) | 2ÇÐÁ¡ |
ħÀÔ Å½Áö ±â¼ú(Intrusion Detection Technology) | 2ÇÐÁ¡ |
ÇØÅ· ¹× ¹ÙÀÌ·¯½º(Hacking &Virus) | 2ÇÐÁ¡ |
ħÀÔ ´ëÀÀ ÅëÇÕ ±â¼ú(Intrusion Response and Security Management) | 2ÇÐÁ¡ |
°´Ã¼ÁöÇâÇÁ·Î±×·¡¹Ö(Object-driented Programming) | 2ÇÐÁ¡ |
°¢°ú¿¬±¸(Subject research) | 2ÇÐÁ¡ |
³í¹®¿¬±¸¥°(Independent Study for Thesis¥°) | 3ÇÐÁ¡ |
³í¹®¿¬±¸¥±(Independent Study for Thesis¥±) | 2ÇÐÁ¡ |
Àü°ø½ÉÈ °ú¸ñ | |
---|---|
Á¤º¸Åë½Å À±¸® ±³À°·Ð(Moral Education of Information Communication) | 2ÇÐÁ¡ |
ÇÁ·Î±×·¡¹ÖƯ·Ð(Topics in programming) | 2ÇÐÁ¡ |
±³À°¿ë ÄÁÅÙÃ÷ °³¹ß(Education Contents Development) | 2ÇÐÁ¡ |
À¯ºñÄõÅͽº ÄÄÇ»ÆÃ(Ubiquitous Computing) | 2ÇÐÁ¡ |
ÀÎÅÍ³Ý È°¿ë Ư·Ð(Internet practical using) | 2ÇÐÁ¡ |
ÀüÈ(Á¶±³½Ç) : 042-629-7677